Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)
☆21Oct 18, 2024Updated last year
Alternatives and similar repositories for DetectCobaltStrike
Users that are interested in DetectCobaltStrike are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- ☆15Jul 13, 2024Updated last year
- ☆12Feb 28, 2023Updated 3 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆34Jun 17, 2022Updated 3 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- 小玩具,用来快速检测银狐家族恶意程序,和部分RAT/C2产品☆68Jan 7, 2025Updated last year
- ☆26Apr 24, 2025Updated 11 months ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆31Jan 2, 2025Updated last year
- ☆24Dec 18, 2022Updated 3 years ago
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆161Oct 27, 2024Updated last year
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- ☆13Sep 14, 2023Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Mar 4, 2023Updated 3 years ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 4 months ago
- Beacon Object File allowing creation of Beacons in different sessions.☆83May 23, 2022Updated 3 years ago
- 一个简单的批量反编译jar包的小脚本☆45Mar 20, 2022Updated 4 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- ☆33Jan 23, 2025Updated last year
- Port of Cobalt Strike's Process Inject Kit☆192Dec 1, 2024Updated last year
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- 重构Beacon☆165Aug 19, 2024Updated last year
- ☆59Oct 17, 2024Updated last year
- Windows Persistence IT-Security☆109Mar 9, 2025Updated last year
- bypassuac、administrator->system提权的免杀小工具,可过Defender、360、卡巴等☆21Jan 1, 2023Updated 3 years ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆66Jun 25, 2025Updated 9 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆67Mar 6, 2026Updated 2 weeks ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆23Nov 28, 2024Updated last year
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- ☆99Sep 20, 2021Updated 4 years ago
- ☆26Apr 10, 2023Updated 2 years ago